Basic Detection – If the objective is simply to generate an alert when a drone is within a specified range of a facility, this can be accomplished using a single HAD unit. However, HAD is easy and affordable to scale. Expanding the coverage area simply by adding additional units. It will also enable a greater breadth and depth of information to be gathered regarding drone activity in an airspace.
Enhanced Protection - If a more comprehensive counter-drone strategy is needed to cover larger spaces with more complicated layouts, a multi-unit system can be deployed that can be scaled and customized using triangulation via additional sensors.
Both configurations feature:
- Detection diameter up to 2 km (1.25 miles)
- Extended range of detection
- All-Weather Effectiveness
- Fully automated - 24/7/365 vigilance
- Fully-Automated and Efficient Operation:
- No additional manpower needed
- Minimal operator training required
- Seamless integration into existing security systems
- HAD’s database is updated periodically to stay current with the latest drone signatures
- Alarms/alerts are automatically triggered when a drone is detected.
- Automated reporting delivers the most critical information up-front in a summary format revealing: the number of drones entering the airspace, the drone model, intrusion time, and frequency of recurrence.
A Software-Centric Solution – the continuous introduction of new drone formats to the market mandates that to be effective, a counter-drone system must have a dynamic software platform to execute timely updates of its database of “drone DNA” for the new drone models. This adaptability is critical to ensure the system is both reliable and effective. HAD enables this to be done via the Internet.
A multi-unit HAD System provides a more comprehensive menu of capabilities:
360 Degree / Dual-layer Protection / 24-7 – HAD creates a two-layered “security dome” tailored to the specifics of the user’s security objectives and strategy. The exterior zone can be tuned to alert of the presence of a drone whereby the interior zone can be configured to trigger specified countermeasures. The security zones can be customized to fit any size facility and can accommodate irregular boundaries as needed.
Locate and Track Multiple Drones
Real-time tracking of a drone’s location is critical to determining if and what type of countermeasures should be deployed. To achieve this, multiple HAD units are utilized to create an aerial security perimeter. This configuration enables the HAD System to generate a map of the monitored area to identify and track the precise location of all drones in the monitored airspace.
Automated Tracking and Alerts – HAD’s sensors provide “24/7/365” real-time tracking of drone activity within the designated security zone. This enables tailoring of the nature and level of the security response. HAD’s proprietary software enables real-time tracking of multiple drones simultaneously, in any conditions, day or night, automatically!
Alerts of intrusions can be sent through SMS, the software user interface, e-mail, network (TCP/IP), SNMP, or smartphone push notification.
Approximate the Location of the Pilot - HAD can assist a security team in approximating the location of a drone’s operator which is a key element of the interdiction process. In addition, because the system is documenting each flyover, this information can be used as evidence to present to and directly address a drone’s operator as to the purpose of recurring flyovers.
Collect Drone Forensics
Not only does HAD’s software track multiple drones simultaneously, it also identifies and documents each drone as a unique entity. This capability enables the creation and application of a “whitelist” (“friendly”) and “blacklist” (“threat”) from the database of drone identities stored in the system adding filtering capabilities and precision to overall drone situational awareness.
HAD assigns a unique identifier to each drone entering the aerial security zone and records the clock time/length/frequency of its flights within this airspace. This information aids security staff in determining if a drone is simply passing by or conducting recurring, unwelcome surveillance flights and thus, may be used to document and investigate the pilot’s actions and intent.
Currently, interfering with a drone’s flight (“mitigation”) is only permitted within the U.S. at a limited number of designated sites. We anticipate that the FAA directives contained in the Reauthorization Act of 20181 will expand the type and number of entities authorized to mitigate drones in a manner that avoids harm to people and property on the ground. Why not be prepared?
The HAD System has a proven, Soft-landing Mitigation™ capability pre-engineered into its form factor. If authority is granted to deploy this capability, it can be activated with a software upgrade. Soft-landing Mitigation™ will likely be the primary form of interdiction approved for civilian use as it avoids causing collateral damage to people and property.
HawkEye’s Soft-landing Mitigation™ feature automatically interdicts RF-piloted drones as they enter the protected airspace and is particularly effective against “swarms” (multiple drones entering the airspace simultaneously). HAD sends rogue drones to a pre-programmed landing-zone where the device can be inspected and confiscated if desired.